Telecoms, Media & Technology is part of the Knowledge and Networking Division of Informa PLC
This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.
Mobile applications are getting more and more complex, and the requirements for apps change all the time. It’s vital that we build a flexible and modern architecture, both in the app and in the backend. This means that applications need to be built out of several, smaller components that work together seamlessly. In this session, we will explore an end-to-end architecture for building a modern enterprise mobile app and its backend. The app is built using Xamarin.Forms, based on the Model–View–ViewModel (MVVM) principles. This results in clear separation of concerns and promotes loose coupling, making changes to the functionality easier to test and implement. On the backend, the application talks with a microservice-based API, built with ASP.NET Core and hosted with Docker. By the end of the session, you will have a good idea on how to create modern mobile apps.
In this session, attendees who are looking to secure SQL Server will learn guiding principles for building a secure system and then be shown how to apply them to SQL Server. Also discussed will be why certain options typically get selected. There are other areas that provide additional security or additional auditing to detect a security incident—this session will provide insight into those. Finally, we'll learn how to automate our customized SQL Server builds, even if we're starting with a provided solution in the cloud.
Kubernetes continues to grow in popularity as a way to manage containers. In this session, we will take an in-depth look at Kubernetes, with the goal answering these questions: - What is container scheduling and why is it important? - How does Kubernetes facilitate running containers at scale? - How do I get started with Kubernetes? - How do I run a real-world workload on Kubernetes? - What are some advanced Kubernetes features that make it appealing?
Want to lessen the risks when migrating to modern PC management? In this session, we will demonstrate how to do so with VMware Workspace ONE through co-management with ConfigMgr for your Windows 10 devices. This session will focus on moving workloads (devices, users, apps, collections) and use cases to modern management so you can reduce time spent on mundane IT tasks and focus on driving value for your business. You will learn all of the options available today as well as best practices for beginning your journey.
In this session, you’ll enter the heroic world of super spies and James Bond as we introduce the concepts of factories, strategy pattern, Inversion of Control, dependency injection and several of the available frameworks. We’ll look at common dependency injection patterns and various IoC/DI frameworks, including the pros and cons, practical steps and guidance. We’ll also provide real-world scenarios with impact to unit testing and application architecture. You should walk away from this session with a new appreciation of DI for your code—and you’ll be humming the James Bond theme song for the rest of the week.
In this session, we’ll look at powerful but simple-to-use datatypes in R such as data frames. The session will also give attendees a chance to upgrade their data analysis skills by looking at R data transformation using a powerful set of tools to make things simple: the tidyverse. Then, we will look at integrating our R work into Power BI, and visualizing our data using beautiful visualizations with R and Power BI. Finally, we will share our work by publishing our Power BI project, with our R code, to the Power BI service. We will also look at refreshing our dataset so that our new dashboard has refreshed data.
When people think of artificial intelligence, they typically think of humanlike, thinking robots or futuristic scenes of self-aware computers taking over the world. But AI goes well beyond the automatons of science fiction into the very real world of modern-day advanced computer science. In this session, we will explore how the new Amazon AI cloud-native deep learning technologies can add the power of artificial intelligence to your applications, providing such features as natural language understanding, automatic speech recognition, visual search, image recognition and text-to-speech (TTC).
A year after moving to DynamoDB, the rumblings began: "Maybe we need a new database." Why would a growing startup switch from a leading NoSQL database to DynamoDB, only to be contemplating a new database a year later? Is such a move even necessary? In this session, we'll cover our DynamoDB journey: why we chose DynamoDB, how we moved to it, and the problems we encountered and how we overcame them. We’ll also look at where DynamoDB is headed and where we are headed. By the end of this session, you'll know why you may want to consider DynamoDB; what challenges you'll likely encounter with scaling, design, local development, backups and failover; and why you may want to look beyond DynamoDB.
Blockchain has captured the collective curiosity of the business and technology world for streamlining business processes, verifying transactions, and reducing the potential for fraud. This session introduces Blockchain as a Service in Azure as a platform for building decentralized applications and enterprise smart contracts that run on Ethereum, completely provisioned in Azure. With focus on Azure Blockchain Workbench, a tool that is part of an ecosystem of services in Azure, along with Azure Confidential Computing and the Coco Framework, in this session you will understand what it takes to build blockchain applications for the enterprise by meeting requirements for governance, security and scalability. You will see how Blockchain Workbench orchestrates several Azure services, including Service Bus, Active Directory, Key Vault, SQL Server, around popular blockchain digital ledgers and into a reference architecture that can be used to build blockchain based applications.
Polybase is Microsoft's newest way of integrating SQL Server with external systems such as Hadoop and Azure Blob Storage. In this session, we will connect SQL Server to an on-premises Hadoop cluster as well as Azure Blob Storage, writing T-SQL queries to retrieve remote data. We will then use DMVs and other resources to show what the Polybase engine is doing behind the scenes. Finally, we will look at interesting use cases for Polybase.
No matter how much organizations labor to secure their networks from external attacks, they are still falling victim to them via malware, vulnerabilities, phishing and social engineering. Is winning the battle a non-starter, or is your security stance simply not strong enough? In this interactive session, we will discuss the state of the security strategy (are we even trying?), the state of the threat and how to win the battle and (possibly) the war. We will also take a technical dive into threat actions.
In this session, we'll explore the configuration and management of Conditional Access for Office 365 and Azure. Through a combination of lectures and demos, you will learn how to protect your resources with Conditional Access. Once we have Conditional Access set up and running, we'll demonstrate the process of testing and troubleshooting user authentication to various applications and in various situations.
Disasters come in many flavors and can strike anytime. Maintaining business continuity and minimizing financial impact after an unexpected event are critical for every business, from startups to large enterprises. Companies that have traditional physical environments typically need to procure, install and maintain spare capacity to plan for disaster recovery. In normal operations, however, the infrastructure typically remains underutilized or overprovisioned. With Amazon Web Services (AWS), businesses can scale up their infrastructure on an as-needed, pay-as-you-go basis with the flexibility to quickly change and optimize resources during a disaster recovery event, which can result in significant cost savings.
Do you want to make your deployments risk-free? Do you want to deliver business values to your customers faster? Do you want to increase the efficiency of your team? Are your application and database deployments separate processes? Do you encounter issues while deploying your database changes? Do you want to automate your testing process? Is your database slowing you down? If the answer to any of the questions is yes, then this presentation is for you. After attending this session, you’ll understand the problems with traditional database development and why organizations are moving toward achieving continuous integration and database DevOps. You’ll also learn about the toolsets that will assist you in this journey toward painless database deployments.
Containers are here, and they’re here to stay. And as a developer, the good news is that Visual Studio 2017 makes containerizing our applications a breeze. In this session, we'll port a non-trivial ASP.NET Core solution to Docker. After executing it locally on our machine, we'll explore which options we have to run it on the cloud and we'll deploy it to AKS (managed Kubernetes) in Azure.
Patching servers and computers is often a cumbersome and stressful task. However, a good patching methodology helps mitigate the effects of endpoint security vulnerabilities and avoid patching pitfalls. This session will teach Systems Administrators how to manage and deploy monthly Microsoft security patches as well as third-party application patches using ConfigMgr. It will also provide instructions on leveraging maintenance windows, automatic deployment rules and server group features for additional flexibility and control.
Microsoft's official PowerShell module for SQL Server offers faster ways to manage your entire data-loving world. In this session, we’ll show you the best new features in the new SQL Server module and why every data professional will find it useful. Prior to SQL Server 2016, using SQL PowerShell was like installing training wheels on a Ducati. The SQL Tools team changed all that by working with the community to prioritize improvements to SQL PowerShell. Additionally, they've started releasing regular updates. The SQL Server team has already delivered new cmdlets to help you manage SQL Agent Jobs, SQL Error Logs, and Add & Remove Logins. A favorite new feature is how you can now query multiple sources (SQL, csv files, etc.) and combine the results easily. By leveraging .NET DataTables, you can insert those results into SQL Server in a streamlined way. By the end of this session, you'll have a taste of all the new capabilities in SQL PowerShell.
You're only as secure as your weakest link—and that includes not just your employees but your vendors and their employees too. You can't protect your data if you don’t know who has access to it, nor what they're doing with it. Unfortunately, most companies have no idea how many systems and people have access to their data. This session will cover why your vendors need to perform ongoing vulnerability scanning (with tools like Threat Stack); why they need to perform an annual penetration test and allow you to review those tests; why they need to be able to demonstrate how they remediated any identified security holes; why you should insist on compliance certifications (SOC2 or ISO20071); and why your vendors should establish notification thresholds <24 hours for data breaches.
Securing your infrastructure and applications in the Amazon Web Services (AWS) cloud doesn't have to be daunting. In this session, you’ll discover that, with a variety of security tools and services at your fingertips, you can quickly discover account-level and network-level activity, secure access to cloud resources at a granular scale, and react quickly to security and operational incidents.
Did you know you can use one of the most popular search engines for analytics? In this session, you'll hear how we leverage the AWS Elasticsearch service to not only drive standard searching but also power analytics and insights into how our platform is used. We'll discuss how we set up AWS Elasticsearch for a large multitenant SaaS application and how we extended beyond standard document storage and search to provide real-time analytics to our customers on how their online self-service experience is working. In addition, we'll discuss our setup and configuration of Elasticsearch, how we manage backups and failovers, and how we plan to manage never-ending data growth in our indexes.
Regular expressions can help you perform incredible tasks with very little effort. Need to create 1,700 logins from an email request? Did developers give you a single script with 300 stored procedures filled with table variables instead of temp tables? Need to move 500 databases to a different drive? Such tasks typically take a long time to code, but regular expressions cut that work from several days to just a few minutes or even from hours to seconds. In this session, you’ll learn how to use regular expressions to significantly decrease the time it takes to do tasks. Stop writing code manually and let regular expressions do it for you.
In this session, we will look at why we should be using Open Source Identity Server instead of purchasing from a vendor. We will also discuss the choices of Open Source Identity Server, Microsoft choices for Identity Server outside of Azure AD, and Identity Server 3 and 4. In addition, there will be a hands-on demonstration on how to quickly and effectively get started.
The European Union’s General Data Protection Regulation (GDPR) represents a paradigm shift in the global privacy requirements that govern how organizations manage and protect personal data while respecting individual choice—no matter where the data is sent, processed or stored. The GDPR introduces new requirements on privacy, security and compliance for organizations that offer goods and services to EU residents. This session will show you how to simplify your path to GDPR compliance as well as which technologies to implement to help you prepare to comply with the GDPR.
As distributed denial-of-service (DDoS) attacks become more sophisticated and complex, they also become much more difficult to combat and block. To protect clients from these damaging and costly incursions and to safeguard mission-critical services, a multilayer mitigation strategy should be employed. This strategy offers protection in several ways: mitigating attacks from the server level (iptables/ModSecurity/mod_evasive) to the application level (PHP applications such as WordPress) as well as securing both Linux OS and firewall layers. Using open-source software also provides protection over and above the server stack (HAProxy), while third-party systems can be effectively utilized to provide an even larger-scale cloud mitigation solution.
This session will demonstrate a multiserver migration from an on-premises hypervisor into AWS using Amazon's own AWS Server Migration Service. You’ll be able to follow the process from the beginning to the end, including the preparation of your local environment up to the server successfully running in AWS.
Session details coming soon.
Did you know you can use PowerShell to do everything in your infrastructure? In this session, we’ll demonstrate how to build and manage a complete infrastructure using nothing but PowerShell. We will also show you how to transform the way you work today into code-based work. Welcome to a world of VSCode.
Session details coming soon.
Traditional imaging takes a lot of time to set up, maintain and administer. And then there’s the often-poor experience delivered to your end users. Learn how VMware AirWatch Unified Endpoint Management (UEM) enables a simplified and streamlined platform so you can get out of the imaging game and deliver a user experience your customers will love! We’ll deep dive into how you can seamlessly make this journey, with this session including best practices, our challenges, lessons learned, plus tips and tricks.
Operational and performance DBAs must walk a tightrope to deliver the best database performance possible within the constraints of departmental budgets. This means finding the right trade-off between storage performance and cost, an exercise that is getting more challenging as the public cloud offers more and more specialized options for storage. In this session, we will discuss each of the storage options available on Amazon Web Services, trade-offs between these options and real-world situations where each is appropriate.
Do you want to make more SQL Servers but don't want to invest in more hardware? Then Relational Database Service (RDS) in Amazon Web Services (AWS) may be the right choice for you. In this session, we will create a server using the Amazon Web Console, explore how to automate installation through Cloud Formation, learn how to administrate the service and walk through advanced features. Whether you are familiar with AWS or are brand new to it, this presentation will at least give you a good overview to decide if RDS is the right service for you.
There’s good news for developers and data analysts—it’s possible to have rapid application development and analytics with the same data source, using Azure Cosmos DB and Power BI. Azure Cosmos DB is a schemaless database, so how is it possible to analyze and create reports of the data for analytics and business intelligence tools? A single Azure Cosmos DB database is great for rapid application development because it can contain JSON documents of various structures, but this needs careful data visualization. In this session, we will analyze and create reports of Azure Cosmos data using Power BI, looking at data from both developer and data analyst aspects.
Simple Mail Transport Protocol, or as it is better known, SMTP, should be simple. It says so in the name. However, the internet of today is not what is was when SMTP was designed. In this session, we will discuss best practices, security measures and other aspects that will enable you to master the control of mail. Topics will include transport encryption of SMTP; spam filtering concepts (recipient filtering, tar pitting, reverse DNS, etc.); anti-spoofing methods (SPF, DMARC, DKIM); encryption of messages (not transport); and DANE and SMTP STS.
In DevOps processes, security is often forgotten. One solution is to implement security as part of the DevOps process. DevOps processes use a number of features, such as infrastructure as a code or configuration as a code, that can be used to bolster security.
In this session, we will go through the various Amazon Web Services (AWS) services you will need to set up a robust deployment system for your serverless applications using services like CodePipeline, CloudFormation and CodeBuild. We will also take a look at weighted deployments and show how to implement them using these services.
Don’t miss this cage match, with ADFS and Azure AD Pass Through Authentication (PTA) going head to head. Both ADFS and PTA are good methods for providing single sign-on to Azure AD (and other services) from domain-joined machines, but which is better? We'll dive deep into topics such as security, reliability, scalability, feasibility and more, with live demos. We will even do a demo migration of ADFS to PTA. Which will win? Come to find out!
Your OLTP database application sustains a heavy, mixed workload with a lot of read and write transactions at the same time reports are delivered from the database to a client application. Performance was fine for a long time, but it is no longer meeting your needs now that it must scale to much higher workloads. What should you do? In this real-world case study, you’ll learn about a series of technologies that provide unprecedented scalability, including data compression, In-Memory OLTP and clustered, partitioned columnstore indexes. We will walk you through a chronology of the application and database architecture, its changes over time and the degree of performance improvement achieved with each new SQL Server feature applied. This session will teach you all about planning and implementing advanced SQL Server performance features and how each one impacts your system performance for applications with 100s or 1,000s of concurrent users.
Blockchain technology is growing in popularity, but how can you best put it to use? In this session, you’ll learn how to implement private blockchain networks, as well as learn how organizations can use enterprise blockchain to build smart contracts to automate process and exchange. You’ll also learn how a blockchain can be used for secure transactions and persisted long-term storage.
When creating a new database, how do you ensure it will shine when things get tough? How many times, when database objects are created with all the defaults, have you seen your database become out of control due to the size, amount of data or even activity? If you want to ensure your database and the objects contained in it can scale and perform well as it grows, you need to do the proper homework before ever creating the database. In this session, we will walk through the various factors that affect performance and scalability under real-life conditions and help you understand how to properly configure databases up front to avoid issues down the road. Scalability is all about having a proper foundation to build on.
While blockchain yields an impressive list of benefits to business applications and business processes, it is a technology that few understand and are able to use effectively. That’s because such obstacles as cost, complexity and lack of resources hinder implementation. Not only will this presentation provide live code and a GitHub fork, but you will get a hands-on opportunity to build out a sample blockchain-enabled application.
9 out of 10 developers will claim that they are proficient in web application security but a recent study seems to contradict this claim. The study showed that that 9 out of 10 web sites have security vulnerabilities, indicating that a more profound knowledge of all relevant threats and countermeasures is paramount. This session will use the presenter's 15+ years experience in web application security and de-facto standard web application security guidelines (like the OWASP Top Ten and the CWE/SANS Top 25) to demonstrate, discuss, and fix various security vulnerabilities. Attendees will hear not only about those issues, but see them in action in relation to mitigating the risks from examples of high-profile incidents.